Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 4.0

Size: px
Start display at page:

Download "Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 4.0"

Transcription

1 Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 4.0 June 2013

2 Document Changes Date Version Description February x RFC version April Public release October Clarifications and errata, updates for non-pin POIs, encrypting card readers February x RFC version June Public release Copyright 2013 PCI Security Standards Council LLC Page 1

3 Table of Contents Document Changes... 1 About This Document... 4 Purpose... 4 Scope of the Document... 4 Main Differences from Previous Version... 5 PTS Approval Modules Selection... 6 Foreword... 7 Evaluation Domains... 7 Device Management... 7 Modular approach... 7 Related Publications... 8 Required Device Information... 9 Optional Use of Variables in the Identifier...11 Evaluation Module Information...12 POS Terminal Integration and Core Requirements Modules...12 Open Protocols Module Protocol Declaration Form...13 Secure Reading and Exchange of Data Module...13 Evaluation Module Groupings...14 Evaluation Module 1: Core Requirements...15 A Core Physical Security Requirements...15 B Core Logical Security Requirements...18 C Online PIN Security Requirement...21 D Offline PIN Security Requirements...21 Evaluation Module 2: POS Terminal integration...23 E POS Terminal Integration Security Requirements...23 Evaluation Module 3: Open Protocols...26 F Discovery...26 G Vulnerability Assessment...27 H Vendor Guidance...28 I Operational Testing...29 J Maintenance...31 Evaluation Module 4: Secure Reading and Exchange of Data (SRED)...32 K Account Data Protection...32 Evaluation Module 5: Device Management Security Requirements...36 L During Manufacturing...36 M Between Manufacturer and Facility of Initial Key Loading or Facility of Initial Deployment...38 Compliance Declaration General Information Form A...40 Compliance Declaration Statement Form B...41 Compliance Declaration Exception Form C...42 Copyright 2013 PCI Security Standards Council LLC Page 2

4 Appendix A: Requirements Applicability Matrix...43 Appendix B: Applicability of Requirements...44 Glossary...48 Copyright 2013 PCI Security Standards Council LLC Page 3

5 About This Document Purpose The purpose of this document is to provide vendors with a list of all the security requirements against which their product will be evaluated in order to obtain Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) device approval. Version 3 introduced significant changes in how PCI will be evaluating PIN and non-pin acceptance POI terminals. PCI no longer maintains three separate security evaluation programs (point-of-sale PIN entry device (PED), encrypting PIN pad (EPP), and unattended payment terminal (UPT)). Instead PCI provides and supports one set of modular requirements, which covers all product options. This change was reflected in our renaming of this document to be the Modular Security Requirements. The layout of the document was also changed to enable vendors to select the appropriate requirements that match the product they are submitting for evaluation. This document supports the submission of products under the following categories: PED or UPT POI devices: Complete terminals that can be provided to a merchant as-is to undertake PIN-related transactions. This includes attended and unattended POS PIN-acceptance devices. Non-PIN acceptance POI devices evaluated for account data protection Encrypting PIN pads that require integration into POS terminals or ATMs. Overall requirements for unattended PIN-acceptance devices currently apply only to POS devices and not to ATMs. Secure components for POS terminals: These products also require integration into a final solution to provide PIN transactions. Examples are OEM PIN entry devices and secure (encrypting) card readers. This version 4 additionally provides for: Submission by the vendor for assessment and publication on the PCI website of a user-available security policy addressing the proper use of the POI in a secure fashion, as further delineated in requirement B20. Greater granularity and robustness of the underlying PCI-recognized laboratory test procedures for compliance validation of a device to these requirements as detailed in the Derived Test Requirements. Scope of the Document This document is part of the evaluation support set that laboratories require from vendors (details of which can be found in the PCI PTS Program Manual) and the set may include: A companion PCI PTS Questionnaire (where technical details of the device are provided) Product samples Technical support documentation Copyright 2013 PCI Security Standards Council LLC Page 4

6 Upon successful compliance testing by the laboratory and approval by the PCI SSC, the PCI PTS POI device (or a secure component) will be listed on the PCI SSC website. Commercial information to be included in the Council s approval must be provided by the vendor to the test laboratory using the forms in the Evaluation Module Information section of this document. Main Differences from Previous Version This document is an evolution of the previous versions and supports a number of new features in the evaluation of POI devices: The reordering of the Core Physical Security Requirements The restructuring of the Open Protocols module The addition of a requirement for the vendor to provide a user-available security policy that will facilitate implementation of an approved POI device in a manner consistent with these requirements, including information on key-management responsibilities, administrative responsibilities, device functionality, identification, and environmental requirements Copyright 2013 PCI Security Standards Council LLC Page 5

7 PTS Approval Modules Selection The graph below gives a preliminary view of which evaluation modules should apply, based on the product undergoing an evaluation. This only reflects applicability of modules. Appendix B: Applicability of Requirements makes further refinement at the requirement level. Copyright 2013 PCI Security Standards Council LLC Page 6

8 Foreword The requirements set forth in this document are the minimum acceptable criteria for the Payment Card Industry (PCI). The PCI has defined these requirements using a risk-reduction methodology that identifies the associated benefit when measured against acceptable costs to design and manufacture POI devices. Thus, the requirements are not intended to eliminate the possibility of fraud, but to reduce its likelihood and limit its consequences. Evaluation Domains Device characteristics are those attributes of the device that define its physical and its logical (functional) characteristics. The physical security characteristics of the device are those attributes that deter a physical attack on the device, for example, the penetration of the device to determine its key(s) or to plant a sensitive data-disclosing bug within it. Logical security characteristics include those functional capabilities that preclude, for example, allowing the device to output a clear-text PIN-encryption key. The evaluation of physical security characteristics is very much a value judgment. Virtually any physical barrier can be defeated with sufficient time and effort. Therefore, many of the requirements have minimum attack calculation values for the identification and initial exploitation of the device based upon factors such as attack time, and expertise and equipment required. Given the evolution of attack techniques and technology, the Associations will periodically review these amounts for appropriateness. Device Management Device management considers how the device is produced, controlled, transported, stored and used throughout its life cycle. If the device is not properly managed, unauthorized modifications might be made to its physical or logical security characteristics. This document is only concerned with the device management for POI devices up to the point of initial key loading. Subsequent to receipt of the device at the initial key-loading facility, the responsibility for the device falls to the acquiring financial institution and its agents (e.g., merchants and processors), and is covered by the operating rules of the participating PCI payment brands and the PCI PIN Security Requirements. Modular approach The Council s PTS POI framework has taken a multifaceted modular approach: In support of modular device architectures offered by POI device vendors. These architectures are the result of the integration of several modules (often offered by third parties) that may include partial PIN entry features. Modular approvals, where a PIN entry device may be approved taking in consideration previously approved components. Offering evaluation modules (modular evaluation packages) that potentially optimize evaluation costs and time when laboratories are reviewing non-conventional architectures, conduct modular approvals or maintain existing approvals (changes in security components, etc.). Copyright 2013 PCI Security Standards Council LLC Page 7

9 Related Publications The following references are applicable and related to the information in this manual. Banking Retail Financial Services Symmetric Key Management ANSI X9.24 Interoperable Secure Key Exchange Key Block Specification for Symmetric Algorithms Integrated Circuit Card Specification for Payment Systems Book 2: Security and Key Management, Version 4.3, November 2011 ANSI TR-31 EMV 4.3 Identification Cards Integrated Circuit Cards ISO 7816 Personal Identification Number (PIN) Management and Security ISO 9564 Banking Key Management (Retail) ISO Banking Secure Cryptographic Devices (Retail) ISO Financial services -- Requirements for message authentication using symmetric techniques Information technology -- Security techniques -- Encryption algorithms -- Part 3: Block ciphers ISO ISO/IEC Guidelines on Triple DES Modes of Operation. ISO TR Guideline for Implementing Cryptography In the Federal Government NIST SP A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications NIST SP Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher NIST SP PCI DSS v2.0 PCI DSS Wireless Guidelines PCI PTS POI DTRs PCI PTS POI Evaluation Vendor Questionnaire PCI SSC PCI SSC PCI SSC PCI SSC Note: These documents are routinely updated and reaffirmed. The current versions should be referenced when using these requirements. Copyright 2013 PCI Security Standards Council LLC Page 8

10 Required Device Information This form is used by the vendor to provide details of the device to be submitted for evaluation. Device type claim Manufacturer*: Hardware Version Number* A : Use of x represents a request for field to be a variable Firmware/Software Version Number*: Use of x represents a request for field to be a variable Application Version Number*: (if applicable) Version of PCI PTS POI Security Requirements: Validation modules required (where applicable, please see Section C Selection of Evaluation Modules): POS terminal containing a PIN entry device (select one): Dedicated for PIN entry only Stand-alone POS terminal UPT (Vending, AFD, Kiosk) Other Encrypting PIN pad (for ATM, Vending, AFD or Kiosk) Secure (encrypting) card reader Other secure component for PIN entry device Non-PED POI device Marketing Model Name/Number*: V4 Core PIN Entry Security POS Terminal Integration Open Protocols FAQ version: Secure Reading and Exchange of Data Other Yes No N/A Vendor Name Previously Approved Components Used* (if applicable) Device Marketing/Model Name PCI PTS Approval Number Expiry Date Product Type per PCI SSC Website Other Continued on next page * Fields marked with an asterisk (*) will be used in the PCI SSC Approved PIN Transaction Security Devices Approval List. A See Optional Use of Variables in the Identifier, following page. Copyright 2013 PCI Security Standards Council LLC Page 9

11 Device Photos Photo(s) of device or component (if applicable) * Photos must show information for a Device Form Factor as noted in the Program Guide Please attach a photo(s) of the terminal under evaluation, 320x320 pixels. Copyright 2013 PCI Security Standards Council LLC Page 10

12 Optional Use of Variables in the Identifier Hardware Version Number Request for Use of the Variable x Note: The firmware version number may also be subject to the use of variables in a manner consistent with hardware version numbers. See the PCI PTS POI Testing and Approval Program Guide for more information. Variable x Position Description of Variable x in the Selected Position Firmware Version Number Request for Use of the Variable x Variable x Position Description of Variable x in the Selected Position Copyright 2013 PCI Security Standards Council LLC Page 11

13 Evaluation Module Information POS Terminal Integration and Core Requirements Modules Fields marked with an asterisk (*) will be used in the PCI SSC Approved PIN Transaction Security Devices List. * PIN Support N/A (explain) Offline only Offline and Online Online only * Key Management N/A (explain) DUKPT Fixed MK/SK * PIN Entry Technology N/A (explain) Physical (Hard) Keys Touch screen Other * Prompt Control N/A (explain) Acquirer-controlled Terminal manufacturer-controlled Other (explain) * Other Functions Provided Display CTLS ICCR MSR OP SRED Copyright 2013 PCI Security Standards Council LLC Page 12

14 Open Protocols Module Protocol Declaration Form Fields marked with an asterisk (*) will be used in the PCI SSC Approved PIN Transaction Security Devices List. Link Layer Protocols IP Protocols Security Protocols IP Services Yes No N/A Name Yes No N/A Name Number Yes No N/A Name Yes No N/A Name Port Number Secure Reading and Exchange of Data Module Fields marked with an asterisk (*) will be used in the PCI SSC Approved PIN Transaction Security Devices List. Does the terminal utilize secure reading and exchange of data? Yes No N/A (explain) Copyright 2013 PCI Security Standards Council LLC Page 13

15 Evaluation Module Groupings In order to allow evaluation flexibility and support business needs of vendors, requirements were grouped in to a series of sets as illustrated in the following table. The laboratory will provide the necessary guidance for the selection of the evaluation modules. Evaluation Module Requirements Set Remarks 1: Core Requirements Physical and logical Security The core logical and physical requirements of PIN-acceptance POI devices 2: POS Terminal Integration POS Terminal Integration The PCI PTS POI approval framework is oriented to the evaluation of integrated PIN entry devices (i.e., device where PIN entry functionality is in a secure logical and physical perimeter). However, it allows the re-use of previously approved individual components or their combinations (card readers, display, keypads, or secure processors) into the approval process of integrated PIN entry devices. The POS Terminal integration Evaluation Module ensures that the integration of previously approved components does not impair the overall security as stated in the security requirements. This module also supports the cost-effective maintenance of components. This module includes security management requirements applicable to the integrated device. 3: Open Protocols Open Protocols A set of requirements that ensures PIN entry devices using open security protocols and open communication protocols to access public networks and services do not have public domain vulnerabilities. 4: Secure Reading and Exchange of Data 5: Device Management Requirements in support of cardholder account data encryption Device Management (Manufacturing and initial key loading) A set of requirements that ensures cardholder data is protected. Life cycle requirements for POIs and their components up until the point of initial key loading. The information is not currently validated, but is still required for vendors to complete. Copyright 2013 PCI Security Standards Council LLC Page 14

16 Evaluation Module 1: Core Requirements A Core Physical Security Requirements Note: In the following requirements, the device under evaluation is referred to as the device. Number Description of Requirement Yes No N/A A1 The device uses tamper-detection and response mechanisms that cause it to become immediately inoperable and result in the automatic and immediate erasure of any sensitive data that may be stored in the device, such that it becomes infeasible to recover the sensitive data. These mechanisms protect against physical penetration of the device by means of (but not limited to) drills, lasers, chemical solvents, opening covers, splitting the casing (seams), and using ventilation openings; and there is not any demonstrable way to disable or defeat the mechanism and insert a PIN-disclosing bug or gain access to secret information without requiring an attack potential of at least 26 per device for identification and initial exploitation, with a minimum of 13 for exploitation, exclusive of the IC card reader B ; and Note: The replacement of both the front and rear casings shall be considered as part of any attack scenario. All attacks shall include a minimum of ten hours attack time for exploitation. A2 A3 A4 Failure of a single security mechanism does not compromise device security. Protection against a threat is based on a combination of at least two independent security mechanisms. The security of the device is not compromised by altering: Environmental conditions Operational conditions (An example includes subjecting the device to temperatures or operating voltages outside the stated operating ranges.) Sensitive functions or data are only used in the protected area(s) of the device. Sensitive data and functions dealing with sensitive data are protected from modification without requiring an attack potential of at least 26 for identification and initial exploitation, with a minimum of 13 for exploitation, exclusive of the IC card reader, for identification and initial exploitation C. B As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 15

17 Number Description of Requirement Yes No N/A A5 A6 There is no feasible way to determine any entered and internally transmitted PIN digit by monitoring sound, electro-magnetic emissions, power consumption or any other external characteristic available for monitoring even with the cooperation of the device operator or sales clerk without requiring an attack potential of at least 26 for identification and initial exploitation with a minimum of 13 for exploitation C. Determination of any PIN-security-related cryptographic key resident in the device, by penetration of the device and/or by monitoring emanations from the device (including power fluctuations), requires an attack potential of at least 35 for identification and initial exploitation with a minimum of 15 for exploitation C. Note: If the POI device has a keypad that can be used to enter non-pin data, the device must meet at least one of the following: A7, B16, or E3.4. A7 applies to any components or paths containing plaintext display signals between the cryptographic processor and display unit. B16 applies to devices that allow for updates of prompts or use cryptography to communicate with a display, whether performed by the vendor or the acquirer. E3.4 is appropriate for unattended devices that do not meet any of the aforementioned. A7 A8 A9 The unauthorized alteration of prompts for non-pin data entry into the PIN entry key pad such that PINs are compromised, i.e., by prompting for the PIN entry when the output is not encrypted, cannot occur without requiring an attack potential of at least 18 per device for identification and initial exploitation with a minimum of 9 for exploitation C. The device provides a means to deter the visual observation of PIN values as they are being entered by the cardholder. It is not feasible to penetrate the device to make any additions, substitutions, or modifications to the magnetic-stripe reader and associated hardware or software, in order to determine or modify magnetic-stripe track data, without requiring an attack potential of at least 16 per device, for identification and initial exploitation, with a minimum of 8 for exploitation C. C As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 16

18 Number Description of Requirement Yes No N/A A10 A11 Secure components intended for unattended devices contain an antiremoval mechanism to protect against unauthorized removal and/or unauthorized re-installation. Defeating or circumventing this mechanism must require an attack potential of at least 18 per device for identification and initial exploitation, with a minimum of 9 for exploitation C. If PIN entry is accompanied by audible tones, the tone for each entered PIN digit is indistinguishable from the tone for any other entered PIN digit. Copyright 2013 PCI Security Standards Council LLC Page 17

19 B Core Logical Security Requirements Note: In the following requirements, the device under evaluation is referred to as the device. Number Description of Requirement Yes No N/A B1 The device performs a self-test, which includes integrity and authenticity tests upon start-up and at least once per day to check whether the device is in a compromised state. In the event of a failure, the device and its functionality fail in a secure manner. The device must reinitialize memory at least every 24 hours. B2 B3 B4 The device s functionality shall not be influenced by logical anomalies such as (but not limited to) unexpected command sequences, unknown commands, commands in a wrong device mode and supplying wrong parameters or data which could result in the device outputting the cleartext PIN or other sensitive data. The firmware, and any changes thereafter, have been inspected and reviewed using a documented and auditable process, and certified as being free from hidden and unauthorized or undocumented functions. If the device allows updates of firmware, the device cryptographically authenticates the firmware and if the authenticity is not confirmed, the firmware update is rejected and deleted. B4.1 The firmware must support the authentication of applications loaded onto the terminal consistent with B4. If the device allows software application and/or configuration updates, the device cryptographically authenticates updates consistent with B4. B5 B6 B7 The device never displays the entered PIN digits. Any array related to PIN entry displays only non-significant symbols, e.g., asterisks. Sensitive data shall not be retained any longer, or used more often, than strictly necessary. Online PINs are encrypted within the device immediately after PIN entry is complete and has been signified as such by the cardholder, e.g., via pressing the enter button. The device must automatically clear its internal buffers when either: The transaction is completed, or The device has timed out waiting for the response from the cardholder or merchant. Access to sensitive services requires authentication. Sensitive services provide access to the underlying sensitive functions. Sensitive functions are those functions that process sensitive data such as cryptographic keys, PINs, and passwords. Entering or exiting sensitive services shall not reveal or otherwise affect sensitive data. Copyright 2013 PCI Security Standards Council LLC Page 18

20 Number Description of Requirement Yes No N/A B8 B9 B10 B11 B12 B13 B14 B15 To minimize the risks from unauthorized use of sensitive services, limits on the number of actions that can be performed and a time limit imposed, after which the device is forced to return to its normal mode. If random numbers are generated by the device in connection with security over sensitive data, the random number generator has been assessed to ensure it is generating numbers sufficiently unpredictable. The device has characteristics that prevent or significantly deter the use of the device for exhaustive PIN determination. The key-management techniques implemented in the device conform to ISO and/or ANSI X9.24. Key-management techniques must support the ANSI TR-31 key derivation methodology or an equivalent methodology for maintaining the TDEA key bundle. The PIN-encryption technique implemented in the device is a technique included in ISO It is not possible to encrypt or decrypt any arbitrary data using any PINencrypting key or key-encrypting key contained in the device. The device must enforce that data keys, key-encipherment keys, and PIN-encryption keys have different values. There is no mechanism in the device that would allow the outputting of a private or secret clear-text key or clear-text PIN, the encryption of a key or PIN under a key that might itself be disclosed, or the transfer of a clear-text key from a component of high security into a component of lesser security. The entry of any other transaction data must be separate from the PINentry process, avoiding the accidental display of a cardholder PIN on the device display. If other data and the PIN are entered on the same keypad, the other data entry and the PIN entry shall be clearly separate operations. Note: If the POI device has a keypad that can be used to enter non-pin data, the device must meet at least one of the following: A7, B16, or E3.4. A7 applies to any components or paths containing plaintext display signals between the cryptographic processor and display unit. B16 applies to devices that allow for updates of prompts or use cryptography to communicate with a display, whether performed by the vendor or the acquirer. E3.4 is appropriate for unattended devices that do not meet any of the aforementioned. Copyright 2013 PCI Security Standards Council LLC Page 19

21 Number Description of Requirement Yes No N/A B16 B17 B18 B19 B20 All prompts for non-pin data entry are under the control of the cryptographic unit of the device and requiring an attack potential of at least 18 per device for identification and initial exploitation with a minimum of 9 for exploitation 4 to circumvent. If the prompts are stored inside the cryptographic unit, they cannot feasibly be altered without causing the erasure of the unit s cryptographic keys. If the prompts are stored outside the cryptographic unit, cryptographic mechanisms must exist to ensure the authenticity and the proper use of the prompts and that modification of the prompts or improper use of the prompts is prevented. If the device supports multiple applications, it must enforce the separation between applications. It must not be possible that one application interferes with or tampers with another application or the OS of the device including, but not limited to, modifying data objects belonging to another application or the OS. The operating system of the device must contain only the software (components and services) necessary for the intended operation. The operating system must be configured securely and run with least privilege. The vendor must provide adequate documented security guidance for the integration of any secure component into a PIN entry POI Terminal. A user-available security policy from the vendor addresses the proper use of the POI in a secure fashion, including information on keymanagement responsibilities, administrative responsibilities, device functionality, identification, and environmental requirements. The security policy must define the roles supported by the POI and indicate the services available for each role in a deterministic tabular format. The POI is capable of performing only its designed functions i.e., there is no hidden functionality. The only approved functions performed by the POI are those allowed by the policy. 4 As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 20

22 C Online PIN Security Requirement Number Description of Requirement Yes No N/A C1 If the device can hold multiple PIN-encryption keys and if the key to be used to encrypt the PIN can be externally selected, the device prohibits unauthorized key replacement and key misuse. D Offline PIN Security Requirements Number Description of Requirement Yes No N/A D1 D2 D3 It is neither feasible to penetrate the ICC reader to make any additions, substitutions, or modifications to either the ICC reader s hardware or software, in order to determine or modify any sensitive data, without requiring an attack potential of at least 20 for identification and initial exploitation, with a minimum of 10 for exploitation E, nor is it possible for both an ICC card and any other foreign object to reside within the card insertion slot. Note: All attacks shall include a minimum of ten hours attack time for exploitation. The opening for the insertion of the IC card is in full view of the cardholder during card insertion so that any untoward obstructions or suspicious objects at the opening are detectable. The ICC reader is constructed so that wires running out of the slot of the IC reader to a recorder or a transmitter (an external bug) can be observed by the cardholder. E As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 21

23 Number Description of Requirement Yes No N/A D4 PIN protection during transmission between the device encrypting the PIN and the ICC reader (at least two must apply): If the device encrypting the PIN and the ICC reader are not integrated into the same secure module, and the cardholder verification method is determined to be: An enciphered PIN, the PIN block shall be enciphered between the device encrypting the PIN and the ICC reader using either an authenticated encipherment key of the IC card, or in accordance with ISO A plaintext PIN, the PIN block shall be enciphered from the device encrypting the PIN to the ICC reader (the ICC reader will then decipher the PIN for transmission in plaintext to the IC card) in accordance with ISO If the device encrypting the PIN and the ICC reader are integrated into the same secure module, and the cardholder verification method is determined to be: An enciphered PIN, the PIN block shall be enciphered using an authenticated encipherment key of the IC card. A plaintext PIN, then encipherment is not required if the PIN block is transmitted wholly through a protected environment (as defined in ISO 9564). If the plaintext PIN is transmitted to the ICC reader through an unprotected environment, the PIN block shall be enciphered in accordance with ISO Copyright 2013 PCI Security Standards Council LLC Page 22

24 Evaluation Module 2: POS Terminal integration E POS Terminal Integration Security Requirements The PCI PTS POI approval framework is oriented to the evaluation of complete PIN-acceptance POI devices (i.e., devices where PIN entry functionality is a secure logical and physical perimeter). However it also allows the re-use of previously approved individual components or their combinations (card readers, display, keypads, or secure processors) into the approval process of integrated PIN entry devices. The POS Terminal Integration Evaluation Module ensures that the integration of previously approved components does not impair the overall security as stated in the security requirements. This module also supports the cost effective maintenance of components. This module includes security management requirements applicable to the integrated device and is applicable anytime previously approved components are combined that will result in a device meeting a PTS approval class. Note: In the following requirements, the device under evaluation is referred to as the device. Number Description of Requirement Yes No N/A Configuration Management E1 Any secure component integrated into a PIN entry POI terminal submitted for evaluation has a clearly identified physical and logical security perimeter (related to PIN entry and card-reading functions). Integration of PIN Entry Functions E2.1 The logical and physical integration of a PCI-approved secure component (or components) into a PIN entry POI terminal must not impact the overall PIN protection level. E2.2 The PIN pad (PIN entry area) and the surrounding area must be designed and engineered in such a way that the complete device does not facilitate the fraudulent placement of an overlay over the PIN pad. An overlay attack must require an attack potential of at least 18 for identification and initial exploitation, with a minimum of 9 for exploitation F. F As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 23

25 Number Description of Requirement Yes No N/A Integration into a POS Terminal E3.1 The logical and physical integration of an approved secure component into a PIN entry POI terminal does not create new attack paths to the PIN. E3.2 The PIN entry POI terminal is equipped with mechanisms to prevent attacks aiming at retaining and stealing the payment card (e.g., Lebanese Loop attack). E3.3 There is a clear logical and/or physical segregation between secure components and non-secure components integrated into the same device. Note: If the POI device has a keypad that can be used to enter non-pin data, the device must meet at least one of the following: A7, B16, or E3.4. A7 applies to any components or paths containing plaintext display signals between the cryptographic processor and display unit. B16 applies to devices that allow for updates of prompts or use cryptography to communicate with a display, whether performed by the vendor or the acquirer. E3.4 is appropriate for unattended devices that do not meet any of the aforementioned. E3.4 The POI (application) must enforce the correspondence between the display messages visible to the cardholder and the operating state (i.e., secure or non-secure mode) of the PIN entry device, e.g., by using cryptographic authentication. If commands impacting the correspondence between the display messages and the operating state of the PIN entry device are received from an external device (e.g., a store controller), the commands enabling data entry must be authenticated. The alteration of the correspondence between the display messages visible to the cardholder and the operating state of the PIN entry device cannot occur without requiring an attack potential of at least 18 per POI for identification and initial exploitation with a minimum of 9 for exploitation G. E3.5 The PIN-accepting POI terminal must be equipped with only one payment card PIN-acceptance interface, e.g., a keyboard. If another interface is present which can be used as a keyboard, a mechanism must exist to prevent its use for PIN entry, e.g., it must not have numeric keys, or it is not possible to use it otherwise for numeric entry or it is controlled in a manner consistent with B16. G As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 24

26 Number Description of Requirement Yes No N/A Removal Requirements E4.1 The device is protected against unauthorized removal. Defeating or circumventing this mechanism must require an attack potential of at least 18 per device for identification and initial exploitation, with a minimum of 9 for exploitation I. E4.2 The vendor documents, maintains and makes available to integrators details on how to implement the protection system against unauthorized removal. E4.3 For each embedded device, the protection system against unauthorized removal is properly implemented as documented by the embedded device manufacturer. Copyright 2013 PCI Security Standards Council LLC Page 25

27 Evaluation Module 3: Open Protocols F Discovery The vendor must complete the following Security Compliance Statements concerning physical and logical interfaces. This table must be completed considering all open protocol interfaces in its entirety. Answer Yes if all the options declared in the Open Protocols Module Protocol Declaration Form are meet these security requirements. Number Description of Requirement Yes No N/A F1 All public domain protocols and interfaces available on the platform are clearly identified in the Open Protocols Module Protocol Declaration Form. Copyright 2013 PCI Security Standards Council LLC Page 26

28 G Vulnerability Assessment The vendor must complete the following Security Compliance Statements concerning the Vulnerability Assessment. This table must be completed considering the vulnerability assessment in its entirety. Answer Yes if all the options declared in the Open Protocols Module Protocol Declaration Form meet these security requirements. Number Description of Requirement Yes No N/A G1 G2 The platform vendor has vulnerability assessment procedures and documentation for each protocol and interface listed in F1 of the Open Protocols Module Protocol Declaration Form. The device has undergone a vulnerability assessment to ensure that the protocols and interfaces list in F1 do not contain exploitable vulnerabilities. a) The vulnerability assessment is supported by a documented analysis describing the security of the protocols and interfaces. b) The vulnerability assessment is supported by a vulnerability survey of information available in the public domain. c) The vulnerability assessment is supported by testing. G3 The platform vendor has vulnerability disclosure measures in place for the device. a) The vulnerability-disclosure measures are documented. b) The vulnerability-disclosure measures ensure a timely distribution of information about newly found vulnerabilities. This information includes identification, description, and assessment of the vulnerabilities. c) The vulnerability-disclosure measures ensure a timely distribution of mitigation measures. Copyright 2013 PCI Security Standards Council LLC Page 27

29 H Vendor Guidance The vendor must complete the following Security Compliance Statements concerning the Vendor Guidance. This table must be completed considering the vendor guidance in its entirety. Answer Yes if all the open protocols and interfaces declared in the Open Protocols Module Protocol Declaration Form meet these security requirements. Table H: Vendor Guidance in its Entirety Number Description of Requirement Yes No N/A H1 H2 H3 The device has security guidance that describes how protocols and services must be used for each interface that is available on the platform identified in the Open Protocols Module Protocol Declaration Form. The device has guidance that describes the default configuration for each protocol and services for each interface that is available on the platform The device has guidance for key management describing how keys and certificates must be used. a) The key-management guidance is at the disposal of internal users, and/or of application developers, system integrators, and end-users of the platform. b) Key-management security guidance describes the properties of all keys and certificates that can be used by the platform. c) Key-management security guidance describes the responsibilities of the platform vendor, application developers, system integrators, and end-users of the platform. d) Key-management security guidance ensures secure use of keys and certificates. Copyright 2013 PCI Security Standards Council LLC Page 28

30 I Operational Testing The vendor must complete the following Security Compliance Statements concerning operational testing of the device. This table must be completed considering the operational testing in its entirety. Answer Yes if all the open protocols and interfaces declared in the Open Protocols Module Protocol Declaration Form meet the security requirement. Table I: Operational Testing in their Entirety Number Description of Requirement Yes No N/A I1 I2 The device has all the security protocols that are available on the platform clearly identified in the Open Protocols Module Protocol Declaration Form. The device is able to provide confidentiality of data sent over a network connection. a) Encryption mechanism utilizes key sizes appropriate for the algorithm(s) in question. b) Encryption is provided by using keys that are established in a secure manner using appropriate key-management procedures, such as those listed in NIST SP800-21, Guidelines for Implementing Cryptography. I3 The device is able to provide the integrity of data that is sent over a network connection. a) Integrity is provided by a MAC as defined in ISO 16609, or by a digital signature. b) Hashing can be provided by at least one of the following algorithms: SHA-224, SHA-256, SHA-384, and SHA-512. c) Examples of appropriate algorithms and minimum key sizes are stated in Appendix D of the PCI PTS POI DTRs. I4 The device uses a declared security protocol to authenticate the server. a) Server authentication utilizes key sizes appropriate for the algorithm(s) in question. b) Hashing can be provided by at least one of the following algorithms: SHA-224, SHA-256, SHA-384, and SHA-512. c) The platform is able to verify the validity of the public keys it receives. d) The platform is able to verify the authenticity of the public keys it receives. Copyright 2013 PCI Security Standards Council LLC Page 29

31 Number Description of Requirement Yes No N/A I5 I6 The device is able to detect replay of messages, and enables the secure handling of the exceptions. The platform implements session management. a) The platform keeps track of all connections and restricts the number of sessions that can remain active on the platform to the minimum necessary number. b) The platform sets time limits for sessions and ensures that sessions are not left open for longer than necessary. Copyright 2013 PCI Security Standards Council LLC Page 30

32 J Maintenance Number Description of Requirement Yes No N/A J1 The platform vendor maintains guidance describing configuration management for the platform a) The guidance is at the disposal of internal users, and/or of application developers, system integrators and end-users of the platform. b) The guidance covers the complete platform; including firmware, applications, certificates and keys. c) The guidance covers the complete life cycle of the platform from development, over manufacturing, up to delivery and operation. d) The security guidance ensures that unauthorized modification is not possible. e) The security guidance ensures that any modification of a PTSapproved platform that impacts platform security, results in a change of the platform identifier. J2 The platform vendor has maintenance measures in place. a) The maintenance measures are documented. b) The maintenance measures ensure timely detection of vulnerabilities that apply to the device by periodical execution of a vulnerability assessment that includes activities such as: analysis, survey of information available in the public domain, and testing. c) The maintenance measures ensure timely assessment and classification of newly found vulnerabilities. d) The maintenance measures ensure timely creation of mitigation measures for newly found vulnerabilities that may impact platform security. J3 J4 Deployed platforms can be updated, and the platform vendor maintains guidance describing how the update mechanism is to be used. The update mechanism ensures confidentiality, integrity, server authentication, and protection against replay by using an appropriate and declared security protocol. If the device allows software and/or configuration updates, the device cryptographically authenticates the update and if the authenticity is not confirmed, the update is rejected and deleted. Copyright 2013 PCI Security Standards Council LLC Page 31

33 Evaluation Module 4: Secure Reading and Exchange of Data (SRED) This module defines requirements for cardholder account data protection. K Account Data Protection Number Description of Requirement Yes No N/A Generic Security Requirements K1 K1.1 K1.2 K2 K3 K3.1 K4 All account data is either encrypted immediately upon entry or entered in clear-text into a secure device and processed within the secure controller of the device. The device protects all account data upon entry (consistent with A10 for magnetic stripe data and D1 for Chip data), and there is no method of accessing the clear-text account data (using methods described in A1) without defeating the security of the device. Defeating or circumventing the security mechanism requires an attack potential of at least 16 for identification and initial exploitation, with a minimum of 8 for exploitation H. Note: MSRs and ICCRs must meet the attack potentials stipulated in DTRs A10 and D1 respectively. Failure of a single security mechanism does not compromise device security. Protection against a threat is based on a combination of at least two independent security mechanisms. The logical and physical integration of an approved secure card reader into a PIN entry POI terminal does not create new attack paths to the account data. The account data is protected (consistent with A2) from the input component to the secure controller of the device. Determination of any cryptographic keys used for account data encryption, by penetration of the device and/or by monitoring emanations from the device (including power fluctuations), requires an attack potential of at least 26 for identification and initial exploitation with a minimum of 13 for exploitation. H Public keys must be stored and used in a manner that protects against unauthorized modification or substitution. Unauthorized modification or substitution requires an attack potential of at least 26 for identification and initial exploitation with a minimum of 13 for exploitation. H All account data shall be encrypted using only ANSI X9 or ISOapproved encryption algorithms (e.g., AES, TDES) and should use ANSI X9 or ISO-approved modes of operation. H As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 32

34 Number Description of Requirement Yes No N/A K5 K6 K7 K8 K9 K10 K11.1 K11.2 K12 K13 K14 If remote key distribution is used, the device supports mutual authentication between the sending key distribution host and receiving device. The device supports data origin authentication of encrypted messages. Secret and private keys that reside within the device to support account data encryption are unique per device. Encryption or decryption of any arbitrary data using any account dataencrypting key or key-encrypting key contained in the device is not permitted. The device must enforce that account data keys, key-encipherment keys, and PIN-encryption keys have different values. If the device may be accessed remotely for the purposes of administration, all access attempts must be cryptographically authenticated. If the authenticity of the access request cannot be confirmed, the access request is denied. The firmware, and any changes thereafter, have been inspected and reviewed consistent with B3. The firmware must confirm the authenticity of all applications loaded onto the terminal consistent with B4. If the device allows software application and/or configuration updates, the device cryptographically authenticates all updates consistent with B4. The vendor must provide clear security guidance consistent with B2 and B6 to all application developers to ensure: That it is not possible for applications to be influenced by logical anomalies which could result in clear text data being outputted whilst the terminal is in encrypting mode. That account data is not retained any longer, or used more often, than strictly necessary. If the device allows updates of firmware, the device cryptographically authenticates the firmware and if the authenticity is not confirmed, the firmware update is rejected and deleted. The device s functionality shall not be influenced by logical anomalies consistent with B2. If the device is capable of communicating over an IP network or uses a public domain protocol (such as but not limited to Wi-Fi or Bluetooth), then requirements specified in DTR Module 3: Open Protocols Requirements have been met. Copyright 2013 PCI Security Standards Council LLC Page 33

35 Number Description of Requirement Yes No N/A K15 K15.1 K15.2 K16 K16.1 K16.2 K17 K18 K19 K20 When operating in encrypting mode, there is no mechanism in the device that would allow the outputting of clear-text account data. Changing between an encrypting and non-encrypting mode of operation requires explicit authentication. When operating in encrypting mode, the secure controller can only release clear-text account data to authenticated applications executing within the device. Account data (in either clear-text or encrypted form) shall not be retained any longer, or used more often, than strictly necessary. If the device is capable of generating surrogate PAN values to be outputted outside of the device, it is not possible to determine the original PAN knowing only the surrogate value. If using a hash function to generate surrogate PAN values, input to the hash function must use a salt with minimum length of 64-bits. If using a hash function to generate surrogate PAN values, the salt is kept secret and appropriately protected. Disclosure of the salt cannot occur without requiring an attack potential of at least 16 per device for identification and initial exploitation with a minimum of 8 for exploitation I. The key-management techniques implemented in the device are consistent with B11. The device has characteristics that prevent or significantly deter the use of the device for exhaustive PAN determination. Environmental or operational conditions cannot be altered to compromise the security of the device, or cause the device to output clear-text account data. (An example includes subjecting the device to temperatures or operating voltages outside the stated operating ranges.) If the device supports multiple applications, it must enforce the separation between applications consistent with B17. I As defined in Appendix B of the PCI PTS POI DTRs. Copyright 2013 PCI Security Standards Council LLC Page 34

36 Number Description of Requirement Yes No N/A K21 K22 K23 The following features of the device s operating system must be in place: The operating system of the device must contain only the software (components and services) necessary for the intended operation. The operating system must be configured securely and run with least privilege. The security policy enforced by the device must not allow unauthorized or unnecessary functions. API functionality and commands that are not required to support specific functionality must be disabled (and where possible, removed). Access to sensitive services requires authentication. Sensitive services provide access to the underlying sensitive functions. Sensitive functions are those functions that process sensitive data such as cryptographic keys, account data, and passwords. Entering or exiting sensitive services shall not reveal or otherwise affect sensitive data. Sensitive services are protected from unauthorized use consistent with B8. Copyright 2013 PCI Security Standards Council LLC Page 35

37 Evaluation Module 5: Device Management Security Requirements L During Manufacturing Note: In the following requirements, the device under evaluation is referred to as the device. The device manufacturer, subject to PCI payment brand site inspections, confirms the following. The PCI test laboratories do not currently validate this information; however, the vendor is still required to complete these forms and the information will be reported to PCI for review and, if necessary, corrective action: Number Description of Requirement Yes No N/A L1 L2 L3 L4 L5 L6 Change-control procedures are in place so that any intended securityrelevant change to the physical or functional capabilities of the device causes a re-certification of the device under the applicable Security Requirements of this document. The certified firmware is protected and stored in such a manner as to preclude unauthorized modification during its entire manufacturing life cycle e.g., by using dual control or standardized cryptographic authentication procedures. The device is assembled in a manner that the components used in the manufacturing process are those components that were certified by the Core PIN Entry and/or POS Terminal Integration Security Requirements evaluation, and that unauthorized substitutions have not been made. Production software (e.g., firmware) that is loaded to devices at the time of manufacture is transported, stored, and used under the principle of dual control, preventing unauthorized modifications and/or substitutions. Subsequent to production but prior to shipment from the manufacturer s or reseller s facility, the device and any of its components are stored in a protected, access-controlled area or sealed within tamper-evident packaging to prevent undetected unauthorized access to the device or its components. If the device will be authenticated at the key-loading facility or the facility of initial deployment by means of secret information placed in the device during manufacturing, then this secret information is unique to each device, unknown and unpredictable to any person, and installed in the device under dual control to ensure that it is not disclosed during installation. Copyright 2013 PCI Security Standards Council LLC Page 36

38 Number Description of Requirement Yes No N/A L7 L8 Security measures are taken during the development and maintenance of POI security related components. The manufacturer must maintain development security documentation describing all the physical, procedural, personnel, and other security measures that are necessary to protect the integrity of the design and implementation of the POI security-related components in their development environment. The development security documentation shall provide evidence that these security measures are followed during the development and maintenance of the POI security-related components. The evidence shall justify that the security measures provide the necessary level of protection to maintain the integrity of the POI security-related components. Controls exist over the repair process and the inspection/testing process subsequent to repair to ensure that the device has not been subject to unauthorized modification. Copyright 2013 PCI Security Standards Council LLC Page 37

39 M Between Manufacturer and Facility of Initial Key Loading or Facility of Initial Deployment Note: In the following requirements, the device under evaluation is referred to as the device. The device manufacturer, subject to PCI payment brand site inspections, confirms the following. The PCI test laboratories do not currently validate this information; however, the vendor is still required to complete these forms and the information will be reported to PCI for review, and if necessary corrective action. Number Description of Requirement Yes No N/A M1 The POI should be protected from unauthorized modification with tamper-evident security features, and customers shall be provided with documentation (both shipped with the product and available securely online) that provides instruction on validating the authenticity and integrity of the POI. Where this is not possible, the POI is shipped from the manufacturer s facility to the initial key-loading facility or to the facility of initial deployment and stored en route under auditable controls that can account for the location of every POI at every point in time. Where multiple parties are involved in organizing the shipping, it is the responsibility of each party to ensure that the shipping and storage they are managing is compliant with this requirement. M2 M3 M4 M5 Procedures are in place to transfer accountability for the device from the manufacturer to the facility of initial deployment. Where the device is shipped via intermediaries such as resellers, accountability will be with the intermediary from the time at which they receive the device until the time it is received by the next intermediary or the point of initial deployment. While in transit from the manufacturer s facility to the initial keyloading facility, the device is: Shipped and stored in tamper-evident packaging; and/or Shipped and stored containing a secret that is immediately and automatically erased if any physical or functional alteration to the device is attempted, that can be verified by the initial key-loading facility, but that cannot feasibly be determined by unauthorized personnel. The device s development security documentation must provide means to the initial key-loading facility to assure the authenticity of the TOE s security relevant components. If the manufacturer is in charge of initial key loading, then the manufacturer must verify the authenticity of the POI security-related components. Copyright 2013 PCI Security Standards Council LLC Page 38

40 Number Description of Requirement Yes No N/A M6 M7 M8 If the manufacturer is not in charge of initial key loading, the manufacturer must provide the means to the initial key-loading facility to assure the verification of the authenticity of the POI security-related components. Each device shall have a unique visible identifier affixed to it. The vendor must maintain a manual that provides instructions for the operational management of the POI. This includes instructions for recording the entire life cycle of the POI security-related components and of the manner in which those components are integrated into a single POI, e.g.: Data on production and personalization Physical/chronological whereabouts Repair and maintenance Removal from operation Loss or theft Copyright 2013 PCI Security Standards Council LLC Page 39

41 Compliance Declaration General Information Form A This form and the requested information are to be completed and returned along with the completed information in the applicable Evaluation Module forms. Device Manufacturer Information Manufacturer: Address 1: Address 2: City: Country: State/Province: Mail Code: Primary Contact: Position/Title: Telephone No: Fax: Address: Website: Copyright 2013 PCI Security Standards Council LLC Page 40

42 Compliance Declaration Statement Form B Manufacturer: Model Name and Number: I, (Name) Compliance Declaration Am an officer of the above company, authorized to verify compliance of the referenced equipment. Am an officer of the designated laboratory, authorized by the manufacturer to verify compliance of the referenced equipment. I hereby attest that the above-referenced model of PIN entry device is: In full compliance with the standards set forth above in the Manufacturer Self-Assessment Form. Not in full compliance with the standards set forth above in the Manufacturer Self-Assessment Form as indicated in the attached Exception Form (Form C). Signature Date Printed Name Title Attach to this form a device-specification sheet that highlights the device characteristics, including photos of the device. These photos are to include both external and internal pictures of the device. The internal pictures are to be sufficient to show the various components of the device. Copyright 2013 PCI Security Standards Council LLC Page 41

43 Compliance Declaration Exception Form C Manufacturer: Model Name and Number: INSTRUCTIONS: For any statement for which the answer was a NO or an N/A, explain why the answer was not YES. Statement Number Explanation Copyright 2013 PCI Security Standards Council LLC Page 42

44 Appendix A: Requirements Applicability Matrix Inside evaluation modules, requirements applicability depends upon the functionalities a device under test provides. Seven functionalities have been identified, as shown below. Functionality PIN Entry Keys Card Reader Feedback to cardholder Terminal is a module Terminal is compound Terminal implements TCP/IP stack Description This is the functionality present for any device under test that captures the PIN from the cardholder and turns it into information. No assumption is made upon the format; this could be a PIN block, but also cover partial PIN information such as a digit, if this partial information is going to form a PIN during a legitimate transaction. This functionality is considered whenever the device under evaluation contains even temporarily keys involved in PIN security. Under the scope of this functionality are the secret keys of symmetric algorithms, the private keys of asymmetric algorithms, and the public keys of asymmetric algorithms (with the limitation of scope to their integrity and authenticity). This functionality applies whenever a device under evaluation has the capability to capture card data, irrespective of the technology being used (i.e., it encompasses both the magnetic stripe and smart card readers). This is further broken down into ICCR and MSR functionality. Each time a device under evaluation implements any way of possibly giving feedback to the cardholder during its PIN-based transaction, it applies to this functionality. This includes but is not limited to auditory and visible feedback (i.e., displays). If the device under evaluation is designed to be integrated into equipment, then it applies for terminal is a module functionality. Modules are also referred to as OEM equipment. A device under evaluation is said to be compound whenever it incorporates one or more modules, in order to cover one or several of the aforementioned functionalities. Being a compound device does not preclude the applicability of terminal is a module functionality. Both functionalities are independent. A device under evaluation implements a TCP/IP stack and associated open protocols. Copyright 2013 PCI Security Standards Council LLC Page 43

45 Requirement PIN Entry Keys ICCR MSR Feedback to cardholder Device is a module Device is compound Implements TCP/IP stack Protects account data Appendix B: Applicability of Requirements Having identified functionalities, a device under evaluation needs to meet or exceed requirements formed by the union of all requirements applicable to each of the functionalities. Please refer to Appendix A: Requirements Applicability Matrix. For compound devices, it is possible that these requirements are met or exceeded by the relevant module(s), if the corresponding requirements are fully covered; however it remains up to the testing house s judgment to evaluate on a case-by-case basis whether supplementary testing is required. To determine which requirements apply to a device, the following steps must take place: 1. Identify which of the functionalities the device supports. 2. For each of the supported functionalities, report any marking x from the functionality column to the baseline column. x stands for applicable, in which case the requirement must be considered for vendor questionnaire and possibly evaluation. Conditions Core Requirements Modules Core Physical Security Requirements A1 x A2 x x A3 x x A4 x x A5 x A6 x A7 A8 A9 x x x If keypad that can be used to enter non-pin data. A10 x x A11 x x Copyright 2013 PCI Security Standards Council LLC Page 44

46 Requirement PIN Entry Keys ICCR MSR Feedback to cardholder Device is a module Device is compound Implements TCP/IP stack Protects account data Conditions Core Logical Security Requirements B1 x x x x B2 x x B3 x x B4 x x B4.1 x x B5 B6 x x B7 x x B8 x x B9 x x x B10 x B11 x B12 x x B13 x B14 x x B15 B16 B17 B18 x x x x If keypad that can be used to enter non-pin data. B19 x x x B20 x x x x x x x x x Additional Online Requirement C1 x Additional Offline Requirements D1 D2 x x Copyright 2013 PCI Security Standards Council LLC Page 45

47 Requirement PIN Entry Keys ICCR MSR Feedback to cardholder Device is a module Device is compound Implements TCP/IP stack Protects account data Requirement PIN Entry Keys ICCR MSR Feedback to cardholder Device is a module Device is compound Implements TCP/IP stack Protects account data Conditions D3 D4 x x Conditions POS Terminal Integration Requirements E1 x x x x x x x x Always applicable E2.1 x x E2.2 x x E3.1 x E3.2 x x x E3.3 x x E3.4 x x x E3.5 x x If keypad that can be used to enter non-pin data. E4.1 x x x E4.2 x x x E4.3 x Open Protocols Security Module All x All requirements applicable Secure Reading and Exchange of Data Module All x All requirements applicable Copyright 2013 PCI Security Standards Council LLC Page 46

48 Requirement PIN Entry Keys ICCR MSR Feedback to cardholder Device is a module Device is compound Implements TCP/IP stack Protects account data Conditions Device Security Requirements During Manufacturing L1 x x x x x x x x x L2 x x x x x x x x x L3 x x x x x x x x x L4 x x x x x x x x x L5 x x x x x x x x x L6 x x x x x x x x x L7 x x x x x x x x x L8 x x x x x x x x x Between Manufacturing and Initial Key Loading M1 x x x x x x x x M2 x x x x x x x x M3 x x x x x x x x M4 x x x x x x x x M5 x x x x x x x x M6 x x x x x x x x M7 x x x x x x x x M8 x x x x x x x x Copyright 2013 PCI Security Standards Council LLC Page 47

49 Glossary Term Account Data Accountability Active Erasure Advanced Encryption Algorithm (AES) Application Authentication Authorization Authorize Check Value Ciphertext Clear-text Compromise Definition At a minimum, account data contains the full PAN and (if present) any elements of sensitive authentication data. The following are also considered to be account data if sent in conjunction with the PAN: cardholder name, expiration date, or service code. Other transaction-relevant information may be included at the vendor s discretion. Note: Encrypted, truncated, masked and hashed PAN data (with salt) may be outputted outside of the device. The property that ensures that the actions of an entity may be traced uniquely to that entity. The intentional clearing of data from storage through a means other than simply removing power (e.g. zeroization, inverting power). The Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. It has been analyzed extensively and is now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES). Application is considered to be any code in the device that does not impact compliance to these security requirements. The process for establishing unambiguously the identity of an entity, process, organization, or person. The right granted to a user to access an object, resource, or function. To permit or give authority to a user to communicate with or make use of an object, resource, or function. A computed value which is the result of passing a data value through a nonreversible algorithm. Check values are generally calculated using a cryptographic transformation, which takes as input a secret key and an arbitrary string and gives a cryptographic check value as output. The computation of a correct check value without knowledge of the secret key shall not be feasible. Check values shall not allow the determination of the secret key. An encrypted message. See Plaintext. In cryptography, the breaching of secrecy and/or security. A violation of the security of a system such that an unauthorized disclosure of sensitive information may have occurred. This includes the unauthorized disclosure, modification, substitution, or use of sensitive data (including plaintext cryptographic keys and other keying material). Copyright 2013 PCI Security Standards Council LLC Page 48

50 Term Cryptographic Key Component (Key Component) Data Encryption Algorithm (DEA) DES Device Controller Digital Signature Double-Length Key DTR DUKPT Electromagnetic Emanations (EME) Electronic Code Book (ECB) Operation Electronic Key Entry EM Definition One of at least two parameters having the characteristics (for example, format, randomness) of a cryptographic key that is combined with one or more like parameters for example, by means of modulo-2 addition to form a cryptographic key. Throughout this document, key component may be used interchangeably with secret share or key fragment. A published encryption algorithm used to protect critical information by enciphering data based upon a variable secret key. The Data Encryption Algorithm is defined in ANSI X3.92: Data Encryption Algorithm for encrypting and decrypting data. Data Encryption Standard (see Data Encryption Algorithm). The National Institute of Standards and Technology Data Encryption Standard, adopted by the U.S. government as Federal Information Processing Standard (FIPS) Publication 46, which allows only hardware implementations of the data encryption algorithm. The device controller may be integrated in either the EPP or the ICCR; or it may be a separate module, possibly PC-operated by a standard operating system. In the latter case, the device controller may contain a cryptographic module if used for PIN re-encryption. The result of an asymmetric cryptographic transformation of data that allows a recipient of the data to validate the origin and integrity of the data and protects the sender against forgery by third parties or the recipient. A cryptographic key having a length of 112 active bits plus 16 parity bits, used in conjunction with the TDES cryptographic algorithm. Derived Test Requirement Derived Unique Key Per Transaction: A key-management method that uses a unique key for each transaction, and prevents the disclosure of any past key used by the transaction originating TRSM. The unique transaction keys are derived from a base-derivation key using only non-secret data transmitted as part of each transaction. An intelligence-bearing signal that, if intercepted and analyzed, potentially discloses the information that is transmitted, received, handled, or otherwise processed by any information-processing equipment. A mode of encryption using a symmetric encryption algorithm, such as DEA, in which each block of data is enciphered or deciphered without using an initial chaining vector or using previously encrypted data blocks. The entry of cryptographic keys into a security cryptographic device in electronic form using a key-loading device. The user entering the key may have no knowledge of the value of the key being entered. Electro-magnetic Copyright 2013 PCI Security Standards Council LLC Page 49

51 Term Encipher Encrypt Encrypted Key (Ciphertext Key) Encrypting PIN Pad (EPP) Encryption Entropy Evaluation Laboratory Evaluation Module Firmware Definition See Encrypt. The (reversible) transformation of data by a cryptographic algorithm to produce ciphertext i.e., the process of transforming plaintext into ciphertext to hide the information content of the data. A cryptographic key that has been encrypted with a key-encrypting key, a PIN, or a password in order to disguise the value of the underlying plaintext key. A device for secure PIN entry and encryption in an unattended PINacceptance device. An EPP may have a built-in display or card reader, or rely upon external displays or card readers installed in the unattended device. An EPP is typically used in an ATM or other unattended device (e.g., an unattended kiosk or automated fuel dispenser) for PIN entry and is controlled by a device controller. An EPP has a clearly defined physical and logical boundary and a tamper-resistant or tamper-evident shell. Encrypting PIN pads require integration into UPTs or ATMs. See Encrypt. The uncertainty of a random variable. Independent entity that performs a security evaluation of the POS terminal against the PCI Security Requirements. Evaluation package corresponding to a well-defined set of requirements. For purposes of these requirements, firmware is considered to be any code within the device that provides security protections needed to comply with device security requirements or can impact compliance to these security requirements. Firmware may be further segmented by code necessary to meet Core, OP or SRED. Other code that exists within the device that does not provide security, and cannot impact security, is not considered firmware. Copyright 2013 PCI Security Standards Council LLC Page 50

52 Term Hash Integrity Interface Irreversible Transformation ISO Joint Interpretation Library (JIL) KEK Key Key Agreement Key Archive Key Backup Key Bundle Key Component Definition A (mathematical) function, which is a non-secret algorithm that takes any arbitrary-length message as input and produces a fixed-length hash result. Approved hash functions satisfy the following properties: 1) One-way: It is computationally infeasible to find any input that maps to any pre-specified output. 2) Collision-resistant: It is computationally infeasible to find any two distinct inputs (e.g., messages) that map to the same output. It may be used to reduce a potentially long message into a hash value or message digest sufficiently compact to be input into a digital-signature algorithm. A good hash is such that the results of applying the function to a (large) set of values in a given domain will be evenly (and randomly) distributed over a smaller range. Ensuring consistency of data; in particular, preventing unauthorized and undetected creation, alteration, or destruction of data. A logical entry or exit point of a cryptographic module that provides access to the module for logical information flows representing physical signals. A non-secret process that transforms an input value to produce an output value such that knowledge of the process and the output value does not feasibly allow the input value to be determined. International Organization for Standardization. An international standards setting organization composed of representatives from various national standards organizations. A set of documents agreed upon by the British, Dutch, French, and German Common Criteria Certification Bodies to provide a common interpretation of criteria for composite evaluations, attack paths, attack quotations, and methodology. See Key-Encrypting Key. See Cryptographic Key. A key-establishment protocol for establishing a shared secret key between entities in such a way that neither of them can predetermine the value of that key. That is, the secret key is a function of information contributed by two or more participants. Process by which a key no longer in operational use at any location is stored. Storage of a protected copy of a key during its operational use. The three cryptographic keys (K1, K2, K3) used with a TDEA mode. See Cryptographic Key Component. Copyright 2013 PCI Security Standards Council LLC Page 51

53 Term Key Deletion Key-encrypting (encipherment or exchange) Key (KEK) Key Establishment Key Fragment Key Generation Key Instance Key Loading Key Management Key Pair Key Replacement Key (Secret) Share Key Storage Key Termination Key Transport Key Usage Definition Process by which an unwanted key, and information from which the key may be reconstructed, is destroyed at its operational storage/use location. A cryptographic key that is used for the encryption or decryption of other keys. The process of making available a shared secret key to one or more entities. Key establishment includes key agreement and key transport. See Cryptographic Key Component. Creation of a new key for subsequent use. The occurrence of a key in one of its permissible forms, that is, plaintext key, key components and enciphered key. Process by which a key is manually or electronically transferred into a secure cryptographic device. The activities involving the handling of cryptographic keys and other related security parameters (e.g., initialization vectors, counters) during the entire life cycle of the keys, including their generation, storage, distribution, loading and use, deletion, destruction, and archiving. Two complementary keys for use with an asymmetric encryption algorithm. One key, termed the public key, is expected to be widely distributed; the other, termed the private key, is expected to be restricted so that it is known only to the appropriate entities. Substitution of one key for another when the original key is known or suspected to be compromised or the end of its operational life is reached. One of at least two parameters related to a cryptographic key generated in such a way that a quorum of such parameters can be combined to form the cryptographic key but such that less than a quorum does not provide any information about the key. Holding of the key in one of the permissible forms. Occurs when a key is no longer required for any purpose and all copies of the key and information required to regenerate or reconstruct the key have been deleted from all locations where they ever existed. A key-establishment protocol under which the secret key is determined by the initiating party and transferred suitably protected. Employment of a key for the cryptographic purpose for which it was intended Copyright 2013 PCI Security Standards Council LLC Page 52

54 Term Key variant Manual Key Entry Masking Master Derivation Key (MDK) Master Key Merchant Message Authentication Code (MAC) Non-Reversible Transformation OEM Card Reader OEM PED Opaque Overlay PAN Password Definition A new key formed by a process (which need not be secret) with the original key, such that one or more of the non-parity bits of the new key differ from the corresponding bits of the original key. The entry of cryptographic keys into a secure cryptographic device, using devices such as buttons, thumb wheels, or a keyboard. Method of concealing a segment of data when displayed. At most the first six and last four digits of a PAN can be displayed by the device. See Derivation Key. In a hierarchy of key-encrypting keys and transaction keys, the highest level of key-encrypting key is known as a Master Key. May also be known as Master File Key or Local Master Key, depending on the vendor s nomenclature. An entity that uses at the point of sale a PCI PTS approved POI PINacceptance device as part of a card-acceptance contract with an acquiring bank. A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of data (example: a hash-based message authentication code). See Irreversible Transformation. A self-contained, secure chip, or hybrid card reader, which requires integration into UPTs. A self-contained point-of-sale POI device containing a PIN pad, display and/or card reader, which requires integration into a final casing. Generally used in UPTs. Impenetrable by light (i.e., light within the visible spectrum of wavelength range of 400nm to 750nm); neither transparent nor translucent within the visible spectrum. Any additional covering including a fake keypad, placed by fraudsters on top of a genuine PIN entry keypad and generally similar in shape and color, The placement of an overlay may also serve the purpose of concealing other attacks. Acronym for primary account number and also referred to as account number. Payment card number (typically for credit or debit cards) that identifies the issuer and the particular cardholder account. A string of characters used to authenticate an identity or to verify access authorization. Copyright 2013 PCI Security Standards Council LLC Page 53

55 Term Personal Identification Number (PIN) PIN Entry Device (PED) Plaintext Plaintext Key Point of Interaction (POI) POS POI Terminal Private Key Pseudo-Random Public Key Definition A numeric personal identification code that authenticates a cardholder in an authorization request that originates at a terminal with authorization only or data capture only capability. A PIN consists only of decimal digits. A complete terminal that can be provided to a merchant as is to undertake PIN-related transactions. This may include either attended or unattended POS POI terminals. The intelligible form of an encrypted text or of its elements. An unencrypted cryptographic key, used in its current form. An electronic-transaction-acceptance product. A POI consists of hardware and software and is hosted in an acceptance equipment to enable a cardholder to perform a card transaction. Thereby the POI may be attended or unattended. POI transactions are IC and/or magnetic-stripe card-based payment transactions. A general description of any terminal used to perform a card-based payment transaction. This may or may not require a PIN to confirm cardholder authentication. A cryptographic key, used with a public-key cryptographic algorithm that is uniquely associated with an entity and is not made public. In the case of an asymmetric signature system, the private key defines the signature transformation. In the case of an asymmetric encipherment system, the private key defines the decipherment transformation. A process that is statistically random and essentially unpredictable, although generated by an algorithmic process. A cryptographic key, used with a public-key cryptographic algorithm, uniquely associated with an entity, and that may be made public. In the case of an asymmetric signature system, the public key defines the verification transformation. In the case of an asymmetric encipherment system, the public key defines the encipherment transformation. A key that is publicly known is not necessarily globally available. The key may only be available to all members of a pre-specified group. Copyright 2013 PCI Security Standards Council LLC Page 54

56 Term Public Key (Asymmetric) Cryptography Random RNG ROM RSA Public Key Cryptography Salt Secret Key Secret Key (Symmetric) Cryptographic Algorithm Secret Share Definition A cryptographic technique that uses two related transformations a public transformation (defined by the public key) and a private transformation (defined by the private key). The two transformations have the property that, given the public transformation, it is not computationally feasible to derive the private transformation. A system based on asymmetric cryptographic techniques can be an encipherment system, a signature system, a combined encipherment and signature system, or a key agreement system. With asymmetric cryptographic techniques, such as RSA, there are four elementary transformations: sign and verify for signature systems, and encipher and decipher for encipherment systems. The signature and the decipherment transformations are kept private by the owning entity, whereas the corresponding verification and encipherment transformations are published. There exist asymmetric cryptosystems (e.g. RSA) where the four elementary functions may be achieved by only two transformations: one private transformation suffices for both signing and decrypting messages, and one public transformation suffices for both verifying and encrypting messages. However, this does not conform to the principle of key separation and, where used, the four elementary transformations and the corresponding keys should be kept separate. See Asymmetric Cryptographic Algorithm. The process of generating values with a high level of entropy and which satisfy various qualifications, using cryptographic and hardware-based noise mechanisms. This results in a value in a set that has equal probability of being selected from the total population of possibilities, hence unpredictable. Random number generator Read-only memory Public-key cryptosystem that can be used for both encryption and authentication. Random string that is concatenated with other data prior to being operated on by a one-way function. A salt should have a minimum length of 64-bits. A cryptographic key, used with a secret-key cryptographic algorithm that is uniquely associated with one or more entities and should not be made public. A secret-key (symmetrical) cryptographic algorithm uses a single secret key for both encryption and decryption. The use of the term secret in this context does not imply a classification level; rather the term implies the need to protect the key from disclosure or substitution. A cryptographic algorithm that uses a single, secret key for both encryption and decryption. See Key (Secret) Share Copyright 2013 PCI Security Standards Council LLC Page 55

57 Term Secure Components (for POI Terminals) Secure Controller Secure Cryptographic Device Secure Cryptoprocessor Secure Key Loader Security Policy Sensitive Authentication Data Sensitive (Secret) Data (Information) Sensitive Functions Sensitive Services Session Key Service Module Definition Products which incorporate security mechanisms for PIN and account data handling and processing, and require integration into a complete terminal, such as OEM PIN entry devices and IC card readers. A secure microprocessor or security protected microprocessor within the terminal, used to manage cardholder data amongst other functions. A physically and logically protected hardware device that provides a secure set of cryptographic services. It includes the set of hardware, firmware, software, or some combination thereof that implements cryptographic logic, cryptographic processes, or both, including cryptographic algorithms. A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures that give it a degree of tamper resistance. A self-contained unit that is capable of storing at least one plaintext or encrypted cryptographic key or key component that can be transferred, upon request, into a cryptographic module. A description of how the specific module meets these security requirements, including the rules derived from this standard and additional rules imposed by the vendor. Security-related information (card validation codes/values, full track data from the magnetic stripe, magnetic-stripe image on the chip or elsewhere, PINs, and PIN blocks) used to authenticate cardholders, appearing in plaintext or otherwise unprotected form. Sensitive data includes but is not restricted to the cardholder PIN, all secret keying material, design characteristics, status information, and other functions that allow access to secure areas within the terminal. Sensitive functions are those functions that process sensitive data such as cryptographic keys and PINs. Sensitive services provide access to the underlying sensitive functions. A key established by a key-management protocol, which provides security services to data transferred between the parties. A single protocol execution may establish multiple session keys e.g., an encryption key and a MAC key. A module providing for non-cardholder activities and oriented towards service or maintenance related functions and may consist of: A service keyboard (SK), A service display (SD), and A service data exchange support (SDE), which may consist of a card reader, a floppy disk drive, a USB interface or the like. Copyright 2013 PCI Security Standards Council LLC Page 56

58 Term SHA-1 SHA-2 Shared Secret Single-Length Key SK Split Knowledge SSL Surrogate PAN Symmetric (Secret) Key Tamper Detection Tamper-Evident Tamper-Resistant Tamper-Responsive Tampering TDEA TDES Terminal Vendor Definition Secure Hash Algorithm. SHA-1 produces a 160-bit message digest. A set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA- 512). SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits. The secret information shared between parties after protocol execution. This may consist of one or more session key(s), or it may be a single secret that is input to a key-derivation function to derive session keys. A cryptographic key having a length of 56 active bits plus 8 parity bits used in conjunction with the DES cryptographic algorithm. Session key A condition under which two or more entities separately have key components that individually convey no knowledge of the resultant cryptographic key. Secure Sockets Layer A unique, non-pci relevant replacement value for a PAN. It must not be possible (except by chance) to recover the original PAN knowing only the surrogate value. A cryptographic key that is used in symmetric cryptographic algorithms. The same symmetric key that is used for encryption is also used for decryption. The automatic determination by a cryptographic module that an attempt has been made to compromise the physical security of the module. A characteristic that provides evidence that an attack has been attempted. Because merchants and cardholders are not trained to identify tamperevidence and it is not expected that there will be frequent inspections by a trained inspector, any tamper evidence must be very strong. The typical uninformed cardholder and merchant must be able to easily recognize that the device has been tampered with. A characteristic that provides passive physical protection against an attack. A characteristic that provides an active response to the detection of an attack. The penetration or modification of an internal operation and/or insertion of active or passive tapping mechanisms to determine or record secret data or to alter the operation of the device. See Triple Data Encryption Algorithm. See Triple Data Encryption Standard. Organization that submits for evaluation a POI device to the PCI PTS framework. Copyright 2013 PCI Security Standards Council LLC Page 57

59 Term TLS TOE Triple Data Encryption Algorithm (TDEA) Triple Data Encryption Standard (TDES) Triple-Length Key Truncation Unattended Payment Terminal (UPT) Unprotected Memory Variant of a Key Working Key XOR Zeroize Definition Transport Layer Security Target of Evaluation The algorithm specified in ANSI X9.52, Triple Data Encryption Algorithm Modes of Operation. See Triple Data Encryption Algorithm. A cryptographic key having a length of 168 active bits plus 24 parity bits, used in conjunction with the TDES cryptographic algorithm. Method of rendering the full PAN unreadable by permanently removing a segment of PAN data. A POS POI device where the transaction is initiated by the cardholder, and there is no immediate merchant support available. These include terminals such as: Automated fuel dispensers Kiosks Self-service devices ticketing/vending or car parking terminals Data retained within components, devices, and recording media that reside outside the cryptographic boundary of a secure cryptographic device. A new key formed by a process (which need not be secret) with the original key, such that one or more of the non-parity bits of the new key differ from the corresponding bits of the original key. A key used to cryptographically process the transaction. A working key is sometimes referred to as a data key, communications key, session key, or transaction key. See Exclusive-Or. The degaussing, erasing, or overwriting of electronically stored data so as to prevent recovery of the data. Copyright 2013 PCI Security Standards Council LLC Page 58

Payment Card Industry (PCI) Unattended Payment Terminal (UPT) Security Requirements Version 1.0

Payment Card Industry (PCI) Unattended Payment Terminal (UPT) Security Requirements Version 1.0 Payment Card Industry (PCI) Unattended Payment Terminal (UPT) Security Requirements Version 1.0 April 2009 Document Changes Date Version Description January 2006 0.1 First Draft February 2006 0.2 Modifications

More information

Payment Card Industry (PCI) POS PIN Entry Device. Security Requirements Version 2.1

Payment Card Industry (PCI) POS PIN Entry Device. Security Requirements Version 2.1 Payment Card Industry (PCI) POS PIN Entry Device Security Requirements Version 2.1 January 2009 Document Changes Date Version Description September 2006 2.x Draft published for comment November 2006 2.x

More information

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014 Payment Card Industry (PCI) PIN Security Requirements and Version 2.0 December 2014 Document Changes Date Version Description October 2011 1.0 Initial release of PCI December 2014 2.0 Initial release of

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

Payment Card Industry (PCI) Hardware Security Module (HSM) Security Requirements Version 1.0

Payment Card Industry (PCI) Hardware Security Module (HSM) Security Requirements Version 1.0 Payment Card Industry (PCI) Hardware Security Module (HSM) Security Requirements Version 1.0 April 2009 Document Changes Date Version Author Description September 2003 0.5 InfoGard Initial Draft October

More information

Payment Card Industry (PCI) PIN Security Requirements. Version 1.0

Payment Card Industry (PCI) PIN Security Requirements. Version 1.0 Payment Card Industry (PCI) PIN Security Requirements Version 1.0 September 2011 PCI Security Standards Council LLC 2011 This document and its contents may not be used, copied, disclosed, or distributed

More information

Visa Inc. PIN Entry Device Requirements

Visa Inc. PIN Entry Device Requirements Visa Inc. PIN Entry Device Requirements The following information is applicable for Visa Inc. regions. Visa Inc. regions include Asia-Pacific (AP); Central and Eastern Europe, Middle East and Africa (CEMEA);

More information

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance Emerging Technology Whitepaper Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance For Transmissions of Cardholder Data and Sensitive Authentication Data Program Guide Version

More information

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) Point-to-Point Encryption Payment Card Industry (PCI) Point-to-Point Encryption Solution Requirements and Version 2.0 June 2015 Document Changes Date Version Description 14 September 2011 1.0 April 2012 1.1 June 2014 2.0 Initial

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) Point-to-Point Encryption Payment Card Industry (PCI) Point-to-Point Encryption Solution Requirements and : Encryption, Decryption, and Key Management within Secure Cryptographic Devices (Hardware/Hardware) Version 1.1.1 July 2013

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

PCI PIN Security Requirements Auditor s Guide. This document is to be used with PCI PIN Security Requirements, Version 1.

PCI PIN Security Requirements Auditor s Guide. This document is to be used with PCI PIN Security Requirements, Version 1. PCI PIN Security Requirements This document is to be used with PCI PIN Security Requirements, Version 1.0 (September 2011) Last Updated: March 2012 PCI PIN Security Requirements: Table of Contents Forward

More information

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Payment Card Industry (PCI) Terminal Software Security. Best Practices Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Merchants with Only Imprint Machines or Only Standalone, Dial-out Terminals Electronic Cardholder

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

EMV mobile Point of Sale (mpos) Initial Considerations

EMV mobile Point of Sale (mpos) Initial Considerations EMV mobile Point of Sale EMV mobile Point of Sale (mpos) Initial Considerations Version 1.1 June 2014 2014 EMVCo, LLC ( EMVCo ). All rights reserved. Any and all uses of the EMV Specifications ( Materials

More information

Visa PIN Security Requirements Auditor s Guide

Visa PIN Security Requirements Auditor s Guide Visa PIN Security Requirements Auditor s Guide To be used in conjunction with Payment Card Industry (PCI) PIN Security Requirements, V1.0 September 2011 Table of Contents Introduction...4 How to Use this

More information

Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013

Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013 Webinar - Skimming and Fraud Protection for Petroleum Merchants November 14 th 2013 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data Storage

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

PIN Entry Device Security Requirements: Frequently Asked Questions

PIN Entry Device Security Requirements: Frequently Asked Questions PIN Entry Device Security Requirements: Frequently sked Questions Contents PCI and PED Security Requirements...1 Laboratory Testing...4 pproval Process...5 PCI PED Testing and EMVco Terminal Type pproval...6

More information

Point-to-Point Encryption

Point-to-Point Encryption Payment Card Industry (PCI) Point-to-Point Encryption Solution Requirements: Encryption, Decryption, and Key Management within Secure Cryptographic Devices (Hardware/Hardware) Initial Release: Version

More information

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide

More information

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319

More information

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA E2EE and PCI Compliancy Martin Holloway VSP Sales Director VeriFone NEMEA Security Breaches In The News 2 Security Breaches In The News 3 Security Breaches In The News 4 Security Breaches In The News 5

More information

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution First Data First Data Market Market Insight Insight Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution SM Solution Organizations who handle payment card data are obligated to comply

More information

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1

More information

PCI PA-DSS Requirements. For hardware vendors

PCI PA-DSS Requirements. For hardware vendors PCI PA-DSS Requirements For hardware vendors PCI security services UL's streamlined PCI PA-DSS certification services get your product to market faster. UL is world leader in advancing safety. Through

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

Payment Application Data Security Standard

Payment Application Data Security Standard Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Need to be PCI DSS compliant and reduce the risk of fraud?

Need to be PCI DSS compliant and reduce the risk of fraud? Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Technology Innovation Programme

Technology Innovation Programme FACT SHEET Technology Innovation Programme The Visa Europe Technology Innovation Programme () was designed to complement the Payment Card Industry (PCI) Data Security Standard (DSS) by reflecting the risk

More information

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE-HW and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE-HW and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE-HW and Attestation of Compliance Hardware Payment Terminals in a Validated P2PE Solution only, No Electronic Cardholder

More information

Visa PIN Security Requirements Key Injection Facility Auditor s Guide

Visa PIN Security Requirements Key Injection Facility Auditor s Guide Visa PIN Security Requirements Key Injection Facility Auditor s Guide To be used in conjunction with Payment Card Industry (PCI) PIN Security Requirements, V1.0 September 2011 Visa PIN Security Requirements

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Payment Transactions Security & Enforcement

Payment Transactions Security & Enforcement Payment Transactions Security & Enforcement A REPORT FROM NEWNET COMMUNICATION TECHNOLOGIES, LLC Copyright NewNet Communication Technologies, LLC. 700 East Butterfield Road, Suite 350, Lombard, IL 60148

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

EMVCo Letter of Approval - Contact Terminal Level 2

EMVCo Letter of Approval - Contact Terminal Level 2 May 18, 2015 Richard Pohl Triton Systems of Delaware, LLC 21405 B Street Long Beach MS 39560 USA Re: EMV Application Kernel: Approval Number(s): EMVCo Letter of Approval - Contact Terminal Level 2 Triton

More information

Compliance and Security Challenges with Remote Administration

Compliance and Security Challenges with Remote Administration Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Point-to-Point Encryption (P2PE) Frequently Asked Questions for PCI Point-to- Point Encryption (P2PE) August 2012 Frequently Asked Questions (FAQs) For PCI Point-to-Point Encryption

More information

Information Technology

Information Technology Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

Archived NIST Technical Series Publication

Archived NIST Technical Series Publication Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

PIN Pad Security Best Practices v2. PIN Pad Security Best Practices

PIN Pad Security Best Practices v2. PIN Pad Security Best Practices PIN Pad Security Best Practices Introduction The payment industry and card associations adopted PED and PCI PED requirements because of concerns that sophisticated criminal organizations may have the resources

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 1.2.1 July 2009 Document Changes Date Version Description Pages October 2008 July 2009 1.2 1.2.1

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

EMV Frequently Asked Questions for Merchants May, 2014

EMV Frequently Asked Questions for Merchants May, 2014 EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

SETUP GUIDE. Thank you for your purchase of Hamilton products! In this handy guide, you will discover: ADDITIONAL REQUIREMENTS SETUP HOW IT WORKS

SETUP GUIDE. Thank you for your purchase of Hamilton products! In this handy guide, you will discover: ADDITIONAL REQUIREMENTS SETUP HOW IT WORKS SETUP GUIDE High Speed Secure Credit Card Processing Thank you for your purchase of Hamilton products! In this handy guide, you will discover: WHAT IS INCLUDED ADDITIONAL REQUIREMENTS HOW IT WORKS SETUP

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009 Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods

More information

JCB Terminal Requirements

JCB Terminal Requirements Version 1.0 April, 2008 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and

More information

Payment Card Industry (PCI) Card Production

Payment Card Industry (PCI) Card Production Payment Card Industry (PCI) Card Production Logical Security Requirements Version 1.0 May 2013 PCI Security Standards Council LLC 2013 This document and its contents may not be used, copied, disclosed,

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Security Policy for Oracle Advanced Security Option Cryptographic Module

Security Policy for Oracle Advanced Security Option Cryptographic Module Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

Policies and Procedures

Policies and Procedures Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

PAYMENT SECURITY. Best Practices

PAYMENT SECURITY. Best Practices PAYMENT SECURITY Best Practices At VeriFone, the protection of cardholder information is a top priority. To ensure merchants have secure payment solutions for their customers, and to help protect merchants

More information

EMV : Frequently Asked Questions for Merchants

EMV : Frequently Asked Questions for Merchants EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited

More information

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc. Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].

More information

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0. Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.0 August 2014 Document Changes Date Version Description August 2014 1.0 To

More information

Meet The Family. Payment Security Standards

Meet The Family. Payment Security Standards Meet The Family Payment Security Standards Meet The Family Payment Security Standards Payment Processing Electronic payments are increasingly becoming part of our everyday lives. For most people, it can

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...

More information

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants UT System Administration Information Security Office Agenda Overview of PCI DSS Compliance versus Non-Compliance PCI

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information